Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,297 papers from all fields of science
Search
Sign In
Create Free Account
Key (cryptography)
Known as:
Encryption key
, Cryptographic key
, Key (cryptology)
Expand
In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm. For encryption…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Authenticated Identity Body
Authentication
BEAR and LION ciphers
Backup
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2011
Review
2011
Modeling and Distributed Provisioning in 10–40–100-Gb/s Multirate Wavelength Switched Optical Networks
N. Sambo
,
M. Secondini
,
+4 authors
P. Castoldi
Journal of Lightwave Technology
2011
Corpus ID: 30108904
In wavelength-switched optical networks (WSONs), quality of transmission (QoT) has to be guaranteed during lightpath provisioning…
Expand
Highly Cited
2006
Highly Cited
2006
How to repair the Hill cipher
I. A. Ismail
,
M. Amin
,
H. Diab
2006
Corpus ID: 57933038
The Hill cipher algorithm is one of the symmetric key algorithms that have several advantages in data encryption. However, a main…
Expand
Highly Cited
2003
Highly Cited
2003
DWDM 40G transmission over trans-pacific distance (10 000 km) using CSRZ-DPSK, enhanced FEC, and all-Raman-amplified 100-km UltraWave fiber spans
C. Rasmussen
,
T. Fjelde
,
+11 authors
P. Reeves-Hall
Journal of Lightwave Technology
2003
Corpus ID: 38279739
We demonstrate error-free dense-wavelength-division multiplexing (DWDM) transmission of 40 40-Gb/s channels with 100-GHz spacing…
Expand
Highly Cited
2003
Highly Cited
2003
On the necessary conditions of optimality of water utilization systems in process plants with multiple contaminants
M. Savelski
,
M. Bagajewicz
2003
Corpus ID: 26579370
Highly Cited
1996
Highly Cited
1996
Frequency-diversity spread-spectrum communication system to counter bandlimited Gaussian interference
G. K. Kaleh
IEEE Transactions on Communications
1996
Corpus ID: 31990011
A spread spectrum system to counter bandlimited Gaussian interference is proposed. The optimum receiver for this system is easy…
Expand
Highly Cited
1989
Highly Cited
1989
Bandwidth efficient coding for fading channels: code construction and performance analysis
C. Schlegel
,
D. Costello
IEEE Journal on Selected Areas in Communications
1989
Corpus ID: 41563470
The authors apply a general method of bounding the event error probability of TCM (trellis-coded modulation) schemes to fading…
Expand
Highly Cited
1989
Highly Cited
1989
Design of coded CPFSK modulation systems for bandwidth and energy efficiency
B. Rimoldi
IEEE Transactions on Communications
1989
Corpus ID: 8247167
Consideration is given to the problems related to the design of M-ary continuous-phase frequency-shift keying (CPFSK) systems…
Expand
Highly Cited
1988
Highly Cited
1988
Multiple trellis coded modulation (MTCM)
D. Divsalar
,
M. Simon
IEEE Transactions on Communications
1988
Corpus ID: 15307531
The authors demonstrate a trellis coded modulation technique referred to as multiple trellis coded modulation (MTCM) wherein more…
Expand
Highly Cited
1988
Highly Cited
1988
Differential detection of GMSK using decision feedback
A. Yongaçoğlu
,
D. Makrakis
,
K. Feher
IEEE Transactions on Communications
1988
Corpus ID: 41180276
Differential detector structures that use decision feedback to partially remove the effect of destructive intersymbol…
Expand
Highly Cited
1984
Highly Cited
1984
Differential detection of Gaussian MSK in a mobile radio environment
M. Simon
,
C. C. Wang
IEEE Transactions on Vehicular Technology
1984
Corpus ID: 15758394
Minimum shift keying with Gaussian shaped transmit pulses is a strong candidate for a modulation technique that satisfies the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE